Best Hacking

TOP 10 HACKING SOFTWARES

Top 10 Hacking Softwares 2012

V$care INC.








The tools listed here are open source and we are not listing any licensed software here.
Also I would like to add that METASPLOIT” has been excluded from this list because it combines the power of several tools listed in top 10 so here we will only rate individual products.


1. NMAP – And the tradition continues and NMAP still the number one
Nmap ,by far is the best security scanning and hacking tool ever made. This software tops every list of tophacking softwares for its two reasons. Firstly,its ease of use and secondly,its wide usage.
It provides a wide range of features like port scanning, fingureprinting, os detection , ping , scanning an IP range , alive hosts etc. It has a rich command mode for advanced users which can combine several commands together to execute ones. Its the most recomended tool for new as well as advanced learners and security experts. It hosts its google  opensource project every year. Download Nmap.





2.SUPER-SCAN-  Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.  If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice. It provides a cool scanning experience with lot of information displayed. Download Superscan.









3. NESSUS vulnerability scanner –  I believe that this is the only tool that can break the top spot of Nmap and reach at number 1. Its a powerful tool but owing to its nature of operation, it is a lot buggy and hangs too. This tool has been the best tool for both network administrators and hackers because of its wide implimentation.The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.Download Nessus



4. John The Riper – The fastest password cracker. It is available for several versions of unix and windows and has remained the all time favorite brute force password cracker.  currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes. Download JTR.




5. WIRESHARK and KISMET-  Improving by 2 points to reach the number 5th spot is wireshark. The 5th spot is combined spot for kismet as well as wireshark.
 It is the most preferred wireless security assessment tool and a single of its type in this field. It is a must have tool for all wireless junkies. Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames.  Download Wireshark.

Kismet is an 802.11 wireless network detector, sniffer, and intrusion detection system.  Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic (devices and drivers permitting). Download Kismet





6. PANGOLIN SQL injection scanner – This is by far the best SQL injection scanner which scans a website for sql injection attacks. It performs test on the database to check if vulnerability exists or not. The tool is built to scan numerous popular databases and works quiet effectively for poorly configured websites. It had a tough competition with Havij but the nature of platform made me to choose Pangolin as the winner in this segment. Download Pangolin







7. NIKTO 2- A fresh arival and a must have. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Download Nikto




8. Low orbit Ion Cannon- LOIC is an effective DOS attack tool which is said to have been made by the popular Anonymous hacking group. This tool can be used to flood a webserver with lots of data packets so that the service goes down and it becomes inaccessible. Recentely this tool was used to bring down PayPal and several other top websites around the globe.Download LOIC







9.CAIN & ABEL- The favourite password cracker of all kind. IT fell several ranks this year owing to its low support for new platform and stiff competition from several similar tools who are constantly updating.
Download Cain and Abel








10. HIDE IP-  There were several tools fighting for this last spot but the high usage of anonymous surfing made me to finally put Hide IP on the 10th spot. It is a great tool for anonymous surfing and having anonymity on the web which is very essential while performing hacks and penetration testing. It had TOR as is closest competitor but owing to the slow speed of TOR i decided Hide IP as the owner of this spot.
Download Platinum Hide IP






Hope you will love playing with these great tools. The list can be never ending as there can are numerous tools around. Before ending this post I will again like to remind my readers that a good hacker is one who understands the crux. Tools are mearly used to simplify our work. So forst understand things manuallythen only jump to using tools.

Copyright©Vscare Incorporation

How TO Crack Windows Password Using Kon-Boot

It appears that removing Windows passwords on a machine where you lost the administrator password has become my passion. Kon-Boot is probably the fastest and easiest way to remove a Windows password. All you have to do is insert the Kon-Boot boot CD, and the tool does the rest for you.

Remove Windows Password -Kon Boot Welcome Screen

Remove Windows Password -Kon Boot Welcome Screen

Shortly after the CD drive starts spinning, you will see the Kon-Boot welcome screen. At this point, you have to press a key for Kon-Boot to continue. Somehow this destroys the beauty of this tool because it would certainly be even cooler to hack Windows without touching a key.

After you press a key, a second “I-am-so-proud-to-be-hacker-screen” appears. You have to wait here until the ego screen finishes its display, and then Kon-Boot will finally do what it is supposed to do. The last part is very quick and only takes a fraction of the time that the tool needs to display its hello-world screens.

Remove Windows Password -Kon.Boot Welcome Screen 2

Kon-Boot changes the contents of the Windows kernel on the fly while booting allowing you to log on without password. Thus the tool doesn’t change the SAM database. If you reboot again without using Kon-Boot you need the old passwords.

Here You Download Kon-Boot

Kon-Boot Version 2.0

Kon-Boot version 2.1

Kon Boot USB Installation Guide:

1. Insert your USB thumb drive into your computer.
2. Run KonBootinstall.exe and select your thumb drive from the list, click enter. If multiple USB drives
appear, be sure to select the drive which corresponds to the proper thumb drive inserted.
This can be verified by browsing My Computer in Windows.
This installation will erase certain information on the thumb drive. Data can be potentially lost!
Be sure to backup before copying if needed.

3. Installation is now complete! You may begin using Kon Boot.

Note : First Format You Pen-Drive ,  Run  as Administrator KonBootinstall.exe file.

Like Our Facebook-Fan Page: Click Here

More info: Click Here


Backtrack 5 Wireless Penetration Testing Beginner’s Ebook

Backtrack 5 Wireless Penetration Testing Beginner’s Ebook

backtrack ebook
Backtrack 5 Wireless Penetration Testing Beginner’s Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.
This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions inwireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.


List Of Topic Covered In This Book

  • Create a Wireless Lab for conducting experiments
  • Monitor the air and sniff wireless packets
  • Bypass WLAN authentication mechanism
  • Crack WEP/WPA/WPA2 encryption mechanisms
  • Break into a WLAN network using infrastructure flaws
  • Break into a Wireless client such as a laptop
  • Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
  • Conduct wireless penetration test in a methodical way